Architectural model of security threats & theircountermeasures in iot T Varshney, N Sharma, I Kaushik, B Bhushan 2019 international conference on computing, communication, and intelligent …, 2019 | 84 | 2019 |
Applicability of industrial IoT in diversified sectors: evolution, applications and challenges R Sethi, B Bhushan, N Sharma, R Kumar, I Kaushik Multimedia technologies in the Internet of Things environment, 45-67, 2021 | 67 | 2021 |
Evolution of IoT & data analytics using deep learning R Tiwari, N Sharma, I Kaushik, A Tiwari, B Bhushan 2019 international conference on computing, communication, and intelligent …, 2019 | 53 | 2019 |
Authentication & encryption based security services in blockchain technology T Varshney, N Sharma, I Kaushik, B Bhushan 2019 International Conference on Computing, Communication, and Intelligent …, 2019 | 45 | 2019 |
Applicability of WSN and biometric models in the field of healthcare N Sharma, I Kaushik, B Bhushan, S Gautam, A Khamparia Deep Learning Strategies for Security Enhancement in Wireless Sensor …, 2020 | 43 | 2020 |
Comfy smart home using IoT S Jadon, A Choudhary, H Saini, U Dua, N Sharma, I Kaushik Proceedings of the International Conference on Innovative Computing …, 2020 | 32 | 2020 |
Hand written digit recognition using machine learning R Sethi, I Kaushik 2020 IEEE 9th International Conference on Communication Systems and Network …, 2020 | 30 | 2020 |
Blockchain as a solution for security attacks in named data networking of things S Goyal, N Sharma, I Kaushik, B Bhushan Security and privacy issues in IoT devices and sensor networks, 211-243, 2021 | 29 | 2021 |
Analysis of various machine learning algorithm for cardiac pulse prediction M Harjani, M Grover, N Sharma, I Kaushik 2019 International Conference on Computing, Communication, and Intelligent …, 2019 | 28 | 2019 |
Black hole attack and its security measure in wireless sensors networks I Kaushik, N Sharma Handbook of wireless sensor networks: issues and challenges in current …, 2020 | 27 | 2020 |
Security countermeasures in web based application A Sharma, A Singh, N Sharma, I Kaushik, B Bhushan 2019 2nd International Conference on Intelligent Computing, Instrumentation …, 2019 | 26 | 2019 |
Taxonomy of attacks on web based applications A Singh, A Sharma, N Sharma, I Kaushik, B Bhushan 2019 2nd International Conference on Intelligent Computing, Instrumentation …, 2019 | 26 | 2019 |
Intrusion detection and security system for blackhole attack I Kaushik, N Sharma, N Singh 2019 2nd International Conference on Signal Processing and Communication …, 2019 | 22 | 2019 |
Integration of blockchain and IoT (B-IoT): architecture, solutions, & future research direction VK Aggarwal, N Sharma, I Kaushik, B Bhushan IOP conference series: materials science and engineering 1022 (1), 012103, 2021 | 21 | 2021 |
Network layers threats & its countermeasures in WSNs V Pruthi, K Mittal, N Sharma, I Kaushik 2019 International Conference on Computing, Communication, and Intelligent …, 2019 | 21 | 2019 |
Traffic control using V-2-V based method using reinforcement learning M Grover, B Verma, N Sharma, I Kaushik 2019 International Conference on Computing, Communication, and Intelligent …, 2019 | 21 | 2019 |
Precedence & issues of IoT based on edge computing S Goyal, N Sharma, I Kaushik, B Bhushan, A Kumar 2020 IEEE 9th International Conference on Communication Systems and Network …, 2020 | 20 | 2020 |
Importunity & evolution of IoT for 5G A Ahmad, B Bhushan, N Sharma, I Kaushik, S Arora 2020 IEEE 9th international conference on communication systems and network …, 2020 | 19 | 2020 |
Attacks and security measures in wireless sensor network N Sharma, I Kaushik, VK Agarwal, B Bhushan, A Khamparia Intelligent Data Analytics for Terror Threat Prediction: Architectures …, 2021 | 18 | 2021 |
Privacy issues & security techniques in big data A Tiwari, N Sharma, I Kaushik, R Tiwari 2019 International Conference on Computing, Communication, and Intelligent …, 2019 | 18 | 2019 |